Questions tagged [authentication]

A process of proving that an entity (commonly a user or organization) is who they claim to be, or who they were previously identified as being. Authentication does not guarantee that particular entity's identity absolutely, it just proves that they are the same agent that has previously successfully asserted their identity. There are three factors (types) of authentication, and a particular authentication process may combine two or more different factors.

Authentication is critical to systems security. It is the mechanism an authoritative system uses to validate a given entity's asserted identity (who they claim to be) is the same as that entity's stored credentials. Credentials must be previously stored for an entity either by the authoritative system, or by another trusted system, before authentication can occur.

Authentication is commonly used in real life in a number of different scenarios, for example a national border agent confirming a person's identity using a passport.

Authentication usually requires the entity being authenticated to produce one or more tokens. These tokens are then used, possibly alongside other properties or characteristics of the entity, to confirm their identity. An example of an authentication token is a password. These tokens can fall into three broad categories, or factors:

  • Something you know. This is the most commonly used authentication factor in electronic systems. It is most commonly implemented as a password or PIN (personal identification number). This is also the most commonly misused authentication factor. Many system require a secondary security question, such as your mother's maiden name, place you were born in or other such trivia. These all belong to this single factor, thus systems can as as many questions as they like and they are still single factor authentication; all the answers are something the entity would know.
  • Something you have. This is most commonly implemented as a formula number generator (like an RSA Key Fob) or a digital certificate (which can be stored on a smart card or less securely as a simple file on a computer). The Key Fobs, Smart Cards, and SSL Certificates are the most commonly used forms of this factor.
  • Something you are. This is commonly known as biometric security. Fingerprints and iris scans are the most common form when used with electronic access systems. Fingerprints and DNA are the most commonly used in law enforcement.

It should be noted that some security experts have reservations about the factor categories. Specifically all authentication factors are fed into the authentication mechanism as computerized information and are therefore subject to the same possible tampering or forgery as any other information. Digital Certificates for example are essentially passwords that are so long a normal person would never memorize it; it must be stored on a medium (thus termed "something you have"). Similarly anyone who has seen a spy movie has undoubtedly seen a fictional character copy a fingerprint or fake an iris scan. This is possible because the authentication mechanism is reliant on a digital reproduction of the physical item; a digital representation that can be duplicated.

There are many indirect authentication schemes as well. Kerberos is one of the most popular, you authenticate against a central store, which then gives you a token. The token can then be used to grant you access to other systems in lieu of the original authentication mechanism.

Authentication should not be confused with Authorization, which involves granting rights to a specific entity. Authorization schemes are commonly dependent on Authentication to ensure security, but are not the same.

See Wikipedia for more information about Authentication and Security.

2218 questions
0
votes
1 answer

server host key usage problem

I have my server host key(private key) in Openssl format that i want to use for server authentication. I prefer to use the trust model that client local database should associates each host name with the corresponding public host key. Since openssl…
Prasad Roy
0
votes
1 answer

ejabberd ldap authentification - user unable to log in

I'm new to ejabberd Server Administration. I am able to log in with Administrator credentials (Who is mentioned as ldap_rootdn) but I am unable to log in with any of the other Users AD credentials There will be an Error message in…
Killom
  • 1
0
votes
0 answers

What sort of authentication is a windows machine local group with a domain user added to it?

I went and looked at a service that was run by a domain user. The process for the service read from a file on the machine's hard drive, and in the ACLs for that service there was an ACE for the local domain administrator group. And inside the domain…
leeand00
  • 4,869
  • 15
  • 69
  • 110
0
votes
1 answer

OpenVPN Client WebUI fail after installing OpenVPN AS

I just installed OpenVPN on ubuntu 16.04. After installing, I can access the Admin WebUI and login with user openvpn. None of the Client login works.I just get the message "Login failed". In the Log Reports on the admin page I see the following…
RR1
  • 101
  • 1
0
votes
1 answer

psql role doesn't exist for remote host, does locally

I have a local psql server configured to use ldap for all but postgres accounts. But ldap isn't used on local where psql has no problem with the role, and fails to find the role using host, where ldap is used. Is the role not found because of a…
Will
  • 161
  • 1
  • 5
0
votes
1 answer

Strongswan eap-identity no trusted certificate

Here is the situation : GW installed on CentOS7 with Strongswan 5.7.2 with these plugins loaded : charon pkcs11 tpm aesni aes des rc2 sha2 sha1 md4 md5 mgf1 random nonce x509 revocation constraints acert pubkey pkcs1 pkcs7 pkcs8 pkcs12 pgp…
DSX
  • 385
  • 1
  • 4
  • 18
0
votes
0 answers

Integrating Duo MFA with OpenVPN Access Server

I've been able to integrate Duo so that I get a push request on my iPhone when logging into the WebUI; however, this is not quite what I was looking for. When I actually request access to the VPN via the application (I use macOS) using my autologin…
sean
  • 195
  • 1
  • 1
  • 5
0
votes
2 answers

Tomcat : Basic authentication spam causing server overload

We have a Debian based server running Tomcat behind a load-balanced webserver. As it's for development, we have added basic authentication in tomcat with username and password. But we are getting so much spam requests with crazy combinations that…
We are Borg
  • 177
  • 1
  • 18
0
votes
1 answer

In apache, is it possible to configure digest authentication to to add an authenticated username cookie to proxied requests?

I have digest authentication configured for a VirtualHost which proxies SOAP requests. I would like my SOAP service to be able to know reliably which user is accessing it -- is there a way to configure apache to pass through the authenticated…
kdt
  • 1,400
  • 3
  • 22
  • 34
0
votes
1 answer

Ldap integration to centos phpipam

I have installed phpipam on CentOS 7 and this is currently working fine, and now i am trying to integrate ldap authentication or AD authentication so i can use domain credentials to log on to service. Is it necessary to join the server to the…
Mus
  • 21
  • 1
  • 5
0
votes
0 answers

Is sudoers entry With NOPASSWD a Security Risk? If So, How Can I Address This?

I'm currently looking to roll-out a 3rd party software agent to my client's linux server infrastructure. The agent will run on startup and shutdown, and one of the pre-requisites for the agent to run is that it has a sudoers file entry of the…
P Burke
  • 183
  • 3
  • 12
0
votes
1 answer

Having auth-secret persist on a Kubernetes cluster

I have a Kubernetes cluster on Google Cloud that has a couple of environments that we want to secure from the public. I changed the Kubernetes Ingress settings to the following: kind: Ingress metadata: name: web-develop-ingress annotations: …
J.Long
  • 101
  • 1
0
votes
1 answer

proftpd server allow second or multiple public key for single user

If I'm using openssh server, allowing multiple public keys are simple. It is enough put it into file ~/.ssh/authorized_keys with content ssh-rsa ****there_is_public_ssh_key**** some_text_typically_user@host ssh-rsa *****second_pub_key**** …
Znik
  • 348
  • 1
  • 3
  • 12
0
votes
1 answer

PHP landing page on Apache server Cisco WLC controller

I have a landing page done on php along with SQL database for WIFI user registration along with Cisco wireless controller. The WLC is redirecting the user to the landing page for authentication / registration. The user logs in successfully but the…
0
votes
0 answers

Nginx basic auth with server instead of htpasswd

In nginx, you can do basic auth by using directive auth_basic like auth_basic "Git Login"; auth_basic_user_file "/var/www/html/git/htpasswd"; Is there a way to authenticate with an API server instead of against htpasswd file? I am building an…
maheshmurthy
  • 185
  • 1
  • 1
  • 6
1 2 3
99
100